Lecture 4 pt. 3 Flashcards

1
Q

What are End Device Logs useful for?

A

Network security analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of logs can be produced by host devices?

A
  • Host logs (Windows, Linux, Mac)
  • HIDS
  • CLI Logs
  • SYSLOG Server Logs
  • SIEMs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can Microsoft Windows host logs be accessed?

A

Through the Windows Event Viewer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four types of Event Viewer logs in Windows?

A
  • Application logs
  • Security logs
  • Setup logs
  • System logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do Application logs capture?

A

Events logged by various applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Security logs capture?

A

Security-related events such as logon attempts and file management operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What information do Setup logs capture?

A

Information about the installation of software, including Windows updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do System logs capture?

A

Information about the installation of software, including Windows updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five types of events produced by Windows logs?

A
  • Error
  • Warning
  • Information
  • Audit Success
  • Audit Failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does an Error event indicate?

A

A significant problem, such as loss of data or functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a Warning event indicate?

A

Not necessarily significant, but may indicate a possible future problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does an Information event describe?

A

The successful operation of an application, driver, or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is logged during an Audit Success event?

A

An audited security access attempt that is successful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is logged during an Audit Failure event?

A

An audited security access attempt that fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Host-based Intrusion Detection Systems (HIDS) logs?

A

Logs from individual hosts, such as servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of Command-line logs?

A

To log command line execution for visibility into incidents.

17
Q

What is Syslog?

A

A client/server protocol for logging events to centralized syslog servers.

18
Q

What are the three distinct parts of a Syslog message format?

A
  • HEADER
  • PRIORITY
  • MESSAGE
19
Q

What does a Severity level of 0 indicate in Syslog?

A

Emergency: system is unusable.

20
Q

What does a Severity level of 1 indicate in Syslog?

A

Alert: action must be taken immediately.

21
Q

What does a Severity level of 2 indicate in Syslog?

A

Critical: critical conditions that should be corrected immediately.

22
Q

What does a Severity level of 3 indicate in Syslog?

A

Error: a failure that is not urgent, should be resolved within a given time.

23
Q

What does a Severity level of 4 indicate in Syslog?

A

Warning: an error does not presently exist but will occur if the condition is not addressed.

24
Q

What does a Severity level of 5 indicate in Syslog?

A

Notice: an unusual event that does not require immediate action.

25
Q

What does a Severity level of 6 indicate in Syslog?

A

Informational: messages regarding normal operation.

26
Q

What does a Severity level of 7 indicate in Syslog?

A

Debug: messages of interest to developers.

27
Q

What is the purpose of IIS Access Logs?

A

To capture transactional data from web servers.

28
Q

What is the significance of Apache Access Logs?

A

They are an essential source of data for network security monitoring.

29
Q

What do DNS proxy server logs document?

A

All the DNS queries and responses that occur on the network.